researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
1996
1997
1998
1999
2000
2001
2002
2004
2005
2007
2008
2010
2011
2012
2014
2015
2016
2017
2019
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
UML
analysis
architecture
composition
control systems
data-flow
design
e-science
meta-model
meta-objects
model checking
modeling
protocol
reliability
rule-based
security
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Andrea Bondavalli
Andrea Ceccarelli
Bojan Cukic
Charles A. Kamhoua
Edward B. Allen
Farokh B. Bastani
Herbert Hecht
Huibiao Zhu
I-Ling Yen
Iain Bate
Jeffrey M. Voas
Jie Xu
Kevin A. Kwiat
Kinji Mori
Mats Per Erik Heimdahl
Mohammad Zulkernine
Raymond A. Paul
Taghi M. Khoshgoftaar
Victor L. Winter
Wei-Tek Tsai
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
assurance
critical
design
engineering
fault
formal
high
model
modeling
real
safety
security
software
system
systems
testing
time
using
verification
HASE (hase)
Editions
Publications
Viewing Publication 1 - 100 from 758
2019
Semantically Enhanced Time Series Databases in IoT-Edge-Cloud Infrastructure
Shuai Zhang 0012
,
Wenxi Zeng
,
I-Ling Yen
,
Farokh B. Bastani
.
hase 2019
:
25-32
[doi]
A Framework for Model-Based Dependability Analysis of Cyber-Physical Systems
Morayo Adedjouma
,
Nataliya Yakymets
.
hase 2019
:
82-89
[doi]
Isochronous Execution Models for High-Assurance Real-Time Systems
Bader Alahmad
,
Sathish Gopalakrishnan
.
hase 2019
:
66-73
[doi]
Development of a Generic Model for Large-Scale Healthcare Organizations
Faisal A. Alkhaldi
,
Ali T. Alouani
.
hase 2019
:
200-207
[doi]
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Richardson Andrade
,
Nelson Rosa
.
hase 2019
:
171-178
[doi]
RangeLocker: Adaptive Range-Sensitive Lockset Analysis for Precise Dynamic Race Detection
Yoshitaka Arahori
.
hase 2019
:
184-191
[doi]
Identification of Multi-Core Interference
Frédéric Boniol
,
Claire Pagetti
,
Nathanaël Sensfelder
.
hase 2019
:
98-106
[doi]
Attack Defense Trees with Sequential Conjunction
Jeremy W. Bryans
,
Hoang Nga Nguyen
,
Siraj A. Shaikh
.
hase 2019
:
247-252
[doi]
Parallel Verification of Software Architecture Design
Nacha Chondamrongkul
,
Jing Sun 0002
,
Bingyang Wei
,
Ian Warren
.
hase 2019
:
50-57
[doi]
Private Blockchain Network for IoT Device Firmware Integrity Verification and Update
Samip Dhakal
,
Fehmi Jaafar
,
Pavol Zavarsky
.
hase 2019
:
164-170
[doi]
Interface Injection with AspectC++ in Embedded Systems
Ulrich Thomas Gabor
,
Christoph-Cordt von Egidy
,
Olaf Spinczyk
.
hase 2019
:
131-138
[doi]
Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach
Mohamad Gharib
,
Paolo Lollini
,
Andrea Ceccarelli
,
Andrea Bondavalli
.
hase 2019
:
74-81
[doi]
Quantitative Validation of Formal Domain Models
Alexei Iliasov
,
Alexander B. Romanovsky
,
Linas Laibinis
.
hase 2019
:
17-24
[doi]
Formalizing Cyber-Physical System Model Transformation Via Abstract Interpretation
Natasha Jarus
,
Sahra Sedigh Sarvestani
,
Ali R. Hurson
.
hase 2019
:
107-114
[doi]
Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability
Edwin Franco Myloth Josephlal
,
Sridhar Adepu
.
hase 2019
:
241-246
[doi]
Asymmetric Key-Based Secure ECU Replacement Without PKI
Ryo Kurachi
,
Hiroaki Takada
,
Naoki Adachi
,
Hiroshi Ueda
,
Yukihiro Miyashita
.
hase 2019
:
234-240
[doi]
Research on Cloud Performance Testing Model
Honghui Li
,
Xiuru Li
,
Huan Wang
,
Jie Zhang
,
Zhouxian Jiang
.
hase 2019
:
179-183
[doi]
The Rotate Stress of Steam Turbine Prediction Method Based on Stacking Ensemble Learning
Haoran Liang
,
Lei Song
,
XuZhi Li
.
hase 2019
:
146-149
[doi]
A Lightweight Framework for Regular Expression Verification
Xiao Liu
,
Yufei Jiang
,
Dinghao Wu
.
hase 2019
:
1-8
[doi]
Air-Ground System Wide Information Management to Achieve Safe Flight Operation
Xiaodong Lu
,
Kazuyuki Morioka
,
Tadashi Koga
,
Yasuto Sumiya
.
hase 2019
:
42-49
[doi]
Modelica-Supported Attack Impact Evaluation in Cyber Physical Energy System
Kaikai Pan
,
Digvijay Gusain
,
Peter Palensky
.
hase 2019
:
228-233
[doi]
Designing Safe and Secure Mixed Traffic Systems
Giedre Sabaliauskaite
,
Lin Shen Liew
,
Fengjun Zhou
,
Jin Cui
.
hase 2019
:
222-227
[doi]
A Framework for Preprocessing Multivariate, Topology-Aware Time Series and Event Data in a Multi-System Environment
Andreas Schörgenhumer
,
Mario Kahlhofer
,
Peter Chalupar
,
Paul Grünbacher
,
Hanspeter Mössenböck
.
hase 2019
:
115-122
[doi]
Real-Time Anomaly Detection Method for Space Imager Streaming Data Based on HTM Algorithm
Lei Song
,
Haoran Liang
,
Taisheng Zheng
.
hase 2019
:
33-38
[doi]
A Refinement Based Method for Developing Distributed Protocols
Paulius Stankaitis
,
Alexei Iliasov
,
Yamine Aït Ameur
,
Tsutomu Kobayashi
,
Fuyuki Ishikawa
,
Alexander B. Romanovsky
.
hase 2019
:
90-97
[doi]
Multi-Layered Safety Architecture of Autonomous Systems: Formalising Coordination Perspective
Inna Vistbakka
,
Elena Troubitsyna
,
Amin Majd
.
hase 2019
:
58-65
[doi]
Towards an Efficient Cyber-Physical System for First-Mile Taxi Transit in Urban Complex
Junjie Wang
,
Peng Xu
,
Jinyang Li
,
Xiaoshan Sun
,
Wenchong Tian
,
Jie Ling
,
Wei Zheng
,
Hengchang Liu
.
hase 2019
:
9-16
[doi]
Timing Modeling and Analysis for AUTOSAR Schedule Tables
Rongkun Yan
,
Jian Guo
.
hase 2019
:
123-130
[doi]
Study of Trust at Device Level of the Internet of Things Architecture
Tunde Akeem Yekini
,
Fehmi Jaafar
,
Pavol Zavarsky
.
hase 2019
:
150-155
[doi]
Modeling and Verifying Spark on YARN Using Process Algebra
Jiaqi Yin
,
Huibiao Zhu
,
Yuan-fei
,
Yucheng Fang
.
hase 2019
:
208-215
[doi]
19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019, Hangzhou, China, January 3-5, 2019
Dongjin Yu
,
Vu Nguyen 0003
,
Congfeng Jiang
, editors,
IEEE,
2019.
[doi]
Simulation on Grounding Fault Location of Distribution Network Based on Regional Parameters
Bo Zhang
,
Haoming Liu
,
Jiajia Song
,
Jinbo Zhang
.
hase 2019
:
216-221
[doi]
Modeling and Verifying Storm Using CSP
Hongyan Zhao
,
Huibiao Zhu
,
Yucheng Fang
,
Lili Xiao
.
hase 2019
:
192-199
[doi]
Security Evaluation of a VM-Based Intrusion-Tolerant System with Pull-Type Patch Management
Junjun Zheng
,
Hiroyuki Okamura
,
Tadashi Dohi
.
hase 2019
:
156-163
[doi]
Mining Accompanying Passing-Vehicles to Discover Suspected Gangs
Wei Zhihao
,
Jianyuan Li
,
Wanqing Li
.
hase 2019
:
39-41
[doi]
Facilitating Failure Analysis with Software Instrumentation
Brad J. Ziegler
,
Sahra Sedigh Sarvestani
,
Ali R. Hurson
.
hase 2019
:
139-145
[doi]
2017
18th IEEE International Symposium on High Assurance Systems Engineering, HASE 2017, Singapore, January 12-14, 2017
IEEE,
2017.
[doi]
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems
Ron Biton
,
Clint Feher
,
Yuval Elovici
,
Asaf Shabtai
,
Gaby Shugol
,
Raz Tikochinski
,
Shachar Kur
.
hase 2017
:
153-156
[doi]
Verification of Interlocking Systems Using Statistical Model Checking
Quentin Cappart
,
Christophe Limbrée
,
Pierre Schaus
,
Jean Quilbeuf
,
Louis-Marie Traonouez
,
Axel Legay
.
hase 2017
:
61-68
[doi]
Attack Graph Based Network Risk Assessment: Exact Inference vs Region-Based Approximation
Qi Cheng
,
Kevin A. Kwiat
,
Charles A. Kamhoua
,
Laurent Njilla
.
hase 2017
:
84-87
[doi]
Cyber-Physical Security of a Chemical Plant
Prakash Rao Dunaka
,
Bruce M. McMillin
.
hase 2017
:
33-40
[doi]
String Stability Analysis of Cooperative Adaptive Cruise Control under Jamming Attacks
Amir Alipour Fanid
,
Monireh Dabaghchian
,
Hengrun Zhang
,
Kai Zeng
.
hase 2017
:
157-162
[doi]
Architecting Holistic Fault Tolerance
Rem Gensh
,
Ashur Rafiev
,
Alexander Romanovsky
,
Alessandro F. Garcia
,
Fei Xia
,
Alex Yakovlev
.
hase 2017
:
5-8
[doi]
Arguing from Hazard Analysis in Safety Cases: A Modular Argument Pattern
Mario Gleirscher
,
Carmen Cârlan
.
hase 2017
:
53-60
[doi]
Defining Risk States in Autonomous Road Vehicles
Mario Gleirscher
,
Stefan Kugele
.
hase 2017
:
112-115
[doi]
Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks
Jonathan Goh
,
Sridhar Adepu
,
Marcus Tan
,
Zi Shan Lee
.
hase 2017
:
140-145
[doi]
Impact of Using a Static-Type System in Computer Programming
Ismail Rizky Harlin
,
Hironori Washizaki
,
Yoshiaki Fukazawa
.
hase 2017
:
116-119
[doi]
Verification of SGAC Access Control Policies Using Alloy and ProB
Nghi Huynh
,
Marc Frappier
,
Amel Mammar
,
Régine Laleau
.
hase 2017
:
120-123
[doi]
Enhancing OpenStack Fault Tolerance for Provisioning Computing Environments
Ali Kanso
,
Nicolas Deixionne
,
Abdelouahed Gherbi
,
Fereydoun Farrahi Moghaddam
.
hase 2017
:
77-83
[doi]
Multi-Level Indoor Navigation Ontology for High Assurance Location-Based Services
Sanya Khruahong
,
Xiaoying Kong
,
Kumbesan Sandrasegaran
,
Li Liu 0005
.
hase 2017
:
128-131
[doi]
Using Source Code Metrics and Multivariate Adaptive Regression Splines to Predict Maintainability of Service Oriented Software
Lov Kumar
,
Santanu Kumar Rath
,
Ashish Sureka
.
hase 2017
:
88-95
[doi]
Quantitative Security and Safety Analysis with Attack-Fault Trees
Rajesh Kumar
,
Mariëlle Stoelinga
.
hase 2017
:
25-32
[doi]
High Assurance Code Generation for Cyber-Physical Systems
Tze Meng Low
,
Franz Franchetti
.
hase 2017
:
104-111
[doi]
Test Prioritization with Optimally Balanced Configuration Coverage
Dusica Marijan
,
Marius Liaaen
.
hase 2017
:
100-103
[doi]
Detecting and Reducing Redundancy in Software Testing for Highly Configurable Systems
Dusica Marijan
,
Sagar Sen
.
hase 2017
:
96-99
[doi]
Cyber Security Resource Allocation: A Markov Decision Process Approach
Laurent L. Njilla
,
Charles A. Kamhoua
,
Kevin A. Kwiat
,
Patrick Hurley
,
Niki Pissinou
.
hase 2017
:
49-52
[doi]
Effectiveness of Association Rules Mining for Invariants Generation in Cyber-Physical Systems
Koyena Pal
,
Sridhar Adepu
,
Jonathan Goh
.
hase 2017
:
124-127
[doi]
Can You See Me On Performance of Wireless Fingerprinting in a Cyber Physical System
Jay Prakash
,
Chuadhry Mujeeb Ahmed
.
hase 2017
:
163-170
[doi]
Integrating Six-Step Model with Information Flow Diagrams for Comprehensive Analysis of Cyber-Physical System Safety and Security
Giedre Sabaliauskaite
,
Sridhar Adepu
.
hase 2017
:
41-48
[doi]
Acquisition of Virtual Machines for Tiered Applications with Availability Constraints
Praneeth Sakhamuri
,
Olivia Das
.
hase 2017
:
132-135
[doi]
Evaluating a Corpus of Root Causes and Measures to Guide RCA Processes in Critical Software
Nuno Silva
,
Marco Vieira
,
João Carlos Cunha
,
Ram Chillarege
.
hase 2017
:
17-24
[doi]
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities
Kazi Zakia Sultana
,
Ajay Deo
,
Byron J. Williams
.
hase 2017
:
69-76
[doi]
Majority is Not Always Supreme: Less Can Be More When Voting with Compromised Nodes
Danielle C. Tarraf
,
Charles A. Kamhoua
,
Kevin A. Kwiat
,
Laurent Njilla
.
hase 2017
:
9-12
[doi]
Multiple Security Domain Nondeducibility Air Traffic Surveillance Systems
Anusha Thudimilla
,
Bruce M. McMillin
.
hase 2017
:
136-139
[doi]
Is My Software Consistent with the Real World?
Jian Xiang
,
John C. Knight
,
Kevin J. Sullivan
.
hase 2017
:
1-4
[doi]
Overview of the Evasion Resilience Testing Technology for Network Based Intrusion Protecting Devices
Qi Xiong
,
Yuan Xu
,
Baofeng Zhang
,
Feng Wang
.
hase 2017
:
146-152
[doi]
2016
An Investigation into the Response of a Water Treatment System to Cyber Attacks
Sridhar Adepu
,
Aditya Mathur
.
hase 2016
:
141-148
[doi]
Using Models to Validate Unanticipated, Fine-Grained Adaptations at Runtime
Mohammed Al-Refai
,
Walter Cazzola
,
Sudipto Ghosh
,
Robert B. France
.
hase 2016
:
23-30
[doi]
Task Characterization for an Effective Worker Targeting in Crowdsourcing
Tarek Awwad
,
Nadia Bennani
,
Lionel Brunie
,
David Coquil
,
Harald Kosch
,
Veronika Rehn-Sonigo
.
hase 2016
:
63-64
[doi]
17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016
Radu F. Babiceanu
,
Hélène Waeselynck
,
Raymond A. Paul
,
Bojan Cukic
,
Jie Xu
, editors,
IEEE,
2016.
[doi]
Correct Instantiation of a System Reconfiguration Pattern: A Proof and Refinement-Based Approach
Guillaume Babin
,
Yamine Aït Ameur
,
Marc Pantel
.
hase 2016
:
31-38
[doi]
The Cost of Formal Verification in Adaptive CPS. An Example of a Virtualized Server Node
Marcello M. Bersani
,
Marisol García-Valls
.
hase 2016
:
39-46
[doi]
Characterization of Cyberattacks Aimed at Integrated Industrial Control and Enterprise Systems: A Case Study
Raymond C. Borges-Hink
,
Katerina Goseva-Popstojanova
.
hase 2016
:
149-156
[doi]
High Assurance Smart Metering
Sara Cleemput
,
Mustafa A. Mustafa
,
Bart Preneel
.
hase 2016
:
294-297
[doi]
Representation of Confidence in Assurance Cases Using the Beta Distribution
Lian Duan
,
Sanjai Rayadurgam
,
Mats Per Erik Heimdahl
,
Oleg Sokolsky
,
Insup Lee
.
hase 2016
:
86-93
[doi]
Safe Multi-objective Planning with a Posteriori Preferences
Ralph Eastwood
,
Robert Alexander
,
Tim Kelly
.
hase 2016
:
78-85
[doi]
Preventing and unifying threats in cyberphysical systems
Eduardo B. Fernández
.
hase 2016
:
292-293
[doi]
Incremental Formal Methods Based Design Approach Demonstrated on a Coupled Tanks Control System
Kerianne H. Gross
,
Aaron W. Fifarek
,
Jonathan A. Hoffman
.
hase 2016
:
181-188
[doi]
Proving Critical Properties of Simulink Models
Ashlie B. Hocking
,
M. Anthony Aiello
,
John C. Knight
,
Nikos Arechiga
.
hase 2016
:
189-196
[doi]
Using Network Topology to Supplement High Assurance Systems
Paul Hyden
,
Ira S. Moskowitz
,
Stephen Russell
.
hase 2016
:
213-219
[doi]
Formal Analysis of Railway Signalling Data
Alexei Iliasov
,
Alexander Romanovsky
.
hase 2016
:
70-77
[doi]
Formalisation-Driven Development of Safety-Critical Systems
Alexei Iliasov
,
Alexander Romanovsky
,
Elena Troubitsyna
,
Linas Laibinis
.
hase 2016
:
165-172
[doi]
Runtime Adjustment of Configuration Models for Consistency Preservation
Azadeh Jahanbanifar
,
Ferhat Khendek
,
Maria Toeroe
.
hase 2016
:
102-109
[doi]
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods
Yufei Jiang
,
Can Zhang
,
Dinghao Wu
,
Peng Liu 0005
.
hase 2016
:
122-131
[doi]
An Extension of Category Partition Testing for Highly Constrained Systems
Sunint Kaur Khalsa
,
Yvan Labiche
.
hase 2016
:
47-54
[doi]
Engineering Adaptive Fault-Tolerance Mechanisms for Resilient Computing on ROS
Michaël Lauer
,
Matthieu Amy
,
Jean-Charles Fabre
,
Matthieu Roy
,
William Excoffon
,
Miruna Stoicescu
.
hase 2016
:
94-101
[doi]
Formal Development of a Secure Access Control Filter
Amel Mammar
,
Thi Mai Nguyen
,
Régine Laleau
.
hase 2016
:
173-180
[doi]
A Holistic Viewpoint-Based SysML Profile to Design Systems-of-Systems
Marco Mori
,
Andrea Ceccarelli
,
Paolo Lollini
,
Andrea Bondavalli
,
Bernhard Frömel
.
hase 2016
:
276-283
[doi]
Towards a MARTE Extension to Address Adaptation Mechanisms
Mohamed Naija
,
Jean-Michel Bruel
,
Samir Ben Ahmed
.
hase 2016
:
240-243
[doi]
Statistical Model Checking for SystemC Models
Van Chan Ngo
,
Axel Legay
,
Jean Quilbeuf
.
hase 2016
:
197-204
[doi]
Compositional Architecture Design for Fuel Tank Thermal Systems
Sean J. S. Regisford
,
Brian K. Hulbert
,
Aaron W. Fifarek
.
hase 2016
:
205-212
[doi]
Securing a Connected Mobile System for Healthcare
Eric Reinsmidt
,
David Schwab
,
Li Yang
.
hase 2016
:
19-22
[doi]
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot
Giedre Sabaliauskaite
,
Geok See Ng
,
Justin Ruths
,
Aditya P. Mathur
.
hase 2016
:
248-251
[doi]
Software Defect Prediction Using Exception Handling Call Graphs: A Case Study
Puntitra Sawadpong
,
Edward B. Allen
.
hase 2016
:
55-62
[doi]
Generating Threat Profiles for Cloud Service Certification Systems
Philipp Stephanow
,
Christian Banse
,
Julian Schütte
.
hase 2016
:
260-267
[doi]
High-Integrity Multitasking in SPARK: Static Detection of Data Races and Locking Cycles
S. Tucker Taft
,
Florian Schanda
,
Yannick Moy
.
hase 2016
:
238-239
[doi]
Integrating a Calculus with Mobility and Quality for Wireless Sensor Networks
Xi Wu
,
Yongxin Zhao
,
Huibiao Zhu
.
hase 2016
:
220-227
[doi]
Synthesis of Logic Interpretations
Jian Xiang
,
John C. Knight
,
Kevin J. Sullivan
.
hase 2016
:
114-121
[doi]
Comparative Modeling and Verification of Pthreads and Dthreads
Yuan-fei
,
Huibiao Zhu
,
Xi Wu
,
Huixing Fang
.
hase 2016
:
132-140
[doi]
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy
Tommaso Zoppi
,
Andrea Ceccarelli
,
Paolo Lollini
,
Andrea Bondavalli
,
Francesco Lo Piccolo
,
Gabriele Giunta
,
Vito Morreale
.
hase 2016
:
228-235
[doi]
Sign in
or
sign up
to see more results.